You may have to Search all our reviewed books and magazines, click the sign up button below to create a free account.
The two volume set LNAI 3801 and LNAI 3802 constitute the refereed proceedings of the annual International Conference on Computational Intelligence and Security, CIS 2005, held in Xi'an, China, in December 2005. The 338 revised papers presented - 254 regular and 84 extended papers - were carefully reviewed and selected from over 1800 submissions. The first volume is organized in topical sections on learning and fuzzy systems, evolutionary computation, intelligent agents and systems, intelligent information retrieval, support vector machines, swarm intelligence, data mining, pattern recognition, and applications. The second volume is subdivided in topical sections on cryptography and coding, cryptographic protocols, intrusion detection, security models and architecture, security management, watermarking and information hiding, web and network applications, image and signal processing, and applications.
The refereed post-proceedings of the International Conference on Computational Intelligence and Security are presented in this volume. The 116 papers were submitted to two rounds of careful review. Papers cover bio-inspired computing, evolutionary computation, learning systems and multi-agents, cryptography, information processing and intrusion detection, systems and security, image and signal processing, and pattern recognition.
This book constitutes the proceedings of the 18th International Symposium on String Processing and Information Retrieval, SPIRE 2011, held in Pisa, Italy, in October 2011. The 30 long and 10 short papers together with 1 keynote presented were carefully reviewed and selected from 102 submissions. The papers are structured in topical sections on introduction to web retrieval, sequence learning, computational geography, space-efficient data structures, algorithmic analysis of biological data, compression, text and algorithms.
The four volume set LNCS 9947, LNCS 9948, LNCS 9949, and LNCS 9950 constitues the proceedings of the 23rd International Conference on Neural Information Processing, ICONIP 2016, held in Kyoto, Japan, in October 2016. The 296 full papers presented were carefully reviewed and selected from 431 submissions. The 4 volumes are organized in topical sections on deep and reinforcement learning; big data analysis; neural data analysis; robotics and control; bio-inspired/energy efficient information processing; whole brain architecture; neurodynamics; bioinformatics; biomedical engineering; data mining and cybersecurity workshop; machine learning; neuromorphic hardware; sensory perception; pattern recognition; social networks; brain-machine interface; computer vision; time series analysis; data-driven approach for extracting latent features; topological and graph based clustering methods; computational intelligence; data mining; deep neural networks; computational and cognitive neurosciences; theory and algorithms.
This book mainly discusses the most important issues in artificial intelligence-aided future networks, such as applying different ML approaches to investigate solutions to intelligently monitor, control and optimize networking. The authors focus on four scenarios of successfully applying machine learning in network space. It also discusses the main challenge of network traffic intelligent awareness and introduces several machine learning-based traffic awareness algorithms, such as traffic classification, anomaly traffic identification and traffic prediction. The authors introduce some ML approaches like reinforcement learning to deal with network control problem in this book. Traditional wor...
Advance Praise for Behind the Burqa "Whenever and wherever adults make war, children die and women are subjected to fear and humiliation. This is true of Afghanistan too. Read this harrowing book. The tragic yet heroic tale of two women is told with great simplicity. They will haunt you." -Elie Wiesel, Nobel Peace Prize Laureate "The stories of Sulima and Hala achingly articulate the twin and enduring legacies of misogyny and violence. A critical historical document, Behind the Burqa ultimately reveals the unbreakable strength of Afghan women." -Eve Ensler, author of The Vagina Monologues Founder and Artistic Director, V-Day "Behind the Burqa provides important information about conditions i...
Shows that the feminist interventions of the Mao era (19491976) continue to influence contemporary Chinese women. This book traces how the legacy of the Maoist gender project is experienced or contested by particular Chinese women, remembered or forgotten in their lives, and highlighted or buried in their narratives. Xin Huang examines four womens life stories: an urban woman who lived through the Mao era (19491976), a rural migrant worker, a lesbian artist who has close connections with transnational queer networks, and an urban woman who has lived abroad. The individual narratives are paired with analysis of the historical and social contexts in which each woman lives. Huang focuses on the shifting relationship between gender and class, fashion and shame in the Mao and post-Mao eras, queer desire and artwork, and contemporary transnational encounters. By rethinking the historical significance and contemporary relevance of one of the twentieth centurys major feminist interventionssocialist and Marxist womens liberation during the Mao yearsThe Gender Legacy of the Mao Era provides insight into current struggles over gender equality in China and around the world.
The two-volume set CCIS 1142 and 1143 constitutes thoroughly refereed contributions presented at the 26th International Conference on Neural Information Processing, ICONIP 2019, held in Sydney, Australia, in December 2019. For ICONIP 2019 a total of 345 papers was carefully reviewed and selected for publication out of 645 submissions. The 168 papers included in this volume set were organized in topical sections as follows: adversarial networks and learning; convolutional neural networks; deep neural networks; embeddings and feature fusion; human centred computing; human centred computing and medicine; human centred computing for emotion; hybrid models; image processing by neural techniques; learning from incomplete data; model compression and optimization; neural network applications; neural network models; semantic and graph based approaches; social network computing; spiking neuron and related models; text computing using neural techniques; time-series and related models; and unsupervised neural models.